Jump to content

Unusual virus scans, computer behaviors


Recommended Posts

Recently:

 

1.  Both Malwarebytes and Microsoft security essential scans will (randomly) either stop midway and never complete or show as complete with 0 errors found after only 5 minutes.  Usually my full scans complete with issue and take at least 50-70 minutes.

 

2.  Random cpu/memory spikes while not being used.  Sometimes taskmanager will show duplicate system entries or entries without a user name/description.  (winlogon.exe and csrss.exe)

 

3.  Ad pop ups in both Chrome and IE that were previously blocked from pop ups or websites that freeze/lock browers or system. 

 

4.  (Maybe unrelated) my mouse pointer is suddenly very inaccurate (but not moving on it's own.)

 

Hope you can help.

 

Thanks,

Allison

 

Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 08-08-2014
Ran by Allison (administrator) on ALLISON-PC on 08-08-2014 15:50:11
Running from C:\Users\Allison\Desktop
Platform: Windows Vista Home Premium Service Pack 2 (X64) OS Language: English (United States)
Internet Explorer Version 9
Boot Mode: Normal

The only official download link for FRST:
Download link for 32-Bit version: http://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/dl/81/
Download link for 64-Bit Version: http://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/dl/82/
Download link from any site other than Bleeping Computer is unpermitted or outdated.
See tutorial for FRST: http://www.geekstogo.com/forum/topic/335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool/

==================== Processes (Whitelisted) =================

(If an entry is included in the fixlist, the process will be closed. The file will not be moved.)

(Microsoft Corporation) C:\Program Files\Microsoft Security Client\MsMpEng.exe
(Microsoft Corporation) C:\Windows\System32\SLsvc.exe
(Microsoft Corporation) C:\Program Files\Microsoft Security Client\msseces.exe
(Microsoft Corporation) C:\Windows\splwow64.exe
(Microsoft Corporation) C:\Windows\SysWOW64\conime.exe
(Microsoft Corporation) C:\Program Files\Internet Explorer\iexplore.exe
(Microsoft Corporation) C:\Program Files\Internet Explorer\iexplore.exe
(Microsoft Corporation) C:\Windows\System32\msiexec.exe
(Microsoft Corporation) C:\Program Files\Internet Explorer\iexplore.exe
(Microsoft Corporation) C:\Program Files\Microsoft Security Client\NisSrv.exe

==================== Registry (Whitelisted) ==================

(If an entry is included in the fixlist, the registry item will be restored to default or removed. The file will not be moved.)

HKLM\...\Run: [MSC] => c:\Program Files\Microsoft Security Client\msseces.exe [1271072 2014-03-11] (Microsoft Corporation)
HKLM-x32\...\Run: [Adobe ARM] => C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe [919008 2012-07-27] (Adobe Systems Incorporated)
HKU\S-1-5-19\...\Run: [WindowsWelcomeCenter] => rundll32.exe oobefldr.dll,ShowWelcomeCenter
HKU\S-1-5-20\...\Run: [WindowsWelcomeCenter] => rundll32.exe oobefldr.dll,ShowWelcomeCenter
HKU\S-1-5-21-463038520-2122480991-1874822206-1000\...\MountPoints2: {597cb971-dda4-11e0-97da-806e6f6e6963} - E:\Autorun.exe

==================== Internet (Whitelisted) ====================

(If an item is included in the fixlist, if it is a registry item it will be removed or restored to default.)

HKCU\Software\Microsoft\Internet Explorer\Main,Start Page Redirect Cache = http://www.msn.com/?ocid=iehp
HKCU\Software\Microsoft\Internet Explorer\Main,Start Page Redirect Cache AcceptLangs = en-us
HKCU\Software\Microsoft\Internet Explorer\Main,Start Page Redirect Cache_TIMESTAMP = 0x4EA7E37A1A19CF01
HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.google.com/
StartMenuInternet: IEXPLORE.EXE - C:\Program Files (x86)\Internet Explorer\iexplore.exe
SearchScopes: HKCU - DefaultScope {C234E77D-BDCF-4122-BAE8-7E70B11545D1} URL = http://www.google.com/search?q={searchTerms}
SearchScopes: HKCU - {C234E77D-BDCF-4122-BAE8-7E70B11545D1} URL = http://www.google.com/search?q={searchTerms}
BHO: No Name -> {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} ->  No File
BHO: Java Plug-In 2 SSV Helper -> {DBC80044-A445-435b-BC74-9C25C1C588A9} -> C:\Program Files\Java\jre6\bin\jp2ssv.dll No File
BHO-x32: Adobe PDF Link Helper -> {18DF081C-E8AD-4283-A596-FA578C2EBDC3} -> C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll (Adobe Systems Incorporated)
BHO-x32: ArcPluginIEBHO Class -> {84BFE29A-8139-402a-B2A4-C23AE9E1A75F} -> C:\Program Files (x86)\Perfect World Entertainment\Arc\Plugins\ArcPluginIE.dll (Perfect World Entertainment Inc)
BHO-x32: HP Smart BHO Class -> {FFFFFFFF-CF4E-4F2B-BDC2-0E72E116A856} -> C:\Program Files (x86)\HP\Digital Imaging\Smart Web Printing\hpswp_BHO.dll (Hewlett-Packard Co.)
DPF: HKLM {7530BFB8-7293-4D34-9923-61A11451AFC5} http://download.eset.com/special/eos/OnlineScanner.cab
DPF: HKLM-x32 {000F1EA4-5E08-4564-A29B-29076F63A37A} http://launch.soe.com/plugin/web/SOEWebInstaller.cab
DPF: HKLM-x32 {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} http://appldnld.apple.com.edgesuite.net/content.info.apple.com/QuickTime/qtactivex/qtplugin.cab
DPF: HKLM-x32 {233C1507-6A77-46A4-9443-F871F945D258} http://download.macromedia.com/pub/shockwave/cabs/director/sw.cab
DPF: HKLM-x32 {7530BFB8-7293-4D34-9923-61A11451AFC5} http://download.eset.com/special/eos/OnlineScanner.cab
DPF: HKLM-x32 {D4B68B83-8710-488B-A692-D74B50BA558E} http://ccfiles.creative.com/Web/softwareupdate/ocx/15113/CTPIDPDE.cab
DPF: HKLM-x32 {E705A591-DA3C-4228-B0D5-A356DBA42FBF} http://ccfiles.creative.com/Web/softwareupdate/su2/ocx/20015/CTSUEng.cab
DPF: HKLM-x32 {F6ACF75C-C32C-447B-9BEF-46B766368D29} http://ccfiles.creative.com/Web/softwareupdate/ocx/15118/CTPID.cab
DPF: HKLM-x32 {FC11A119-C2F7-46F4-9E32-937ABA26816E} file:///D:/CDVIEWER/CdViewer.cab
Handler-x32: http\0x00000001 - {E1D2BF42-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files (x86)\Common Files\SYSTEM\OLE DB\msdaipp.dll (Microsoft Corporation)
Handler-x32: http\oledb - {E1D2BF40-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files (x86)\Common Files\SYSTEM\OLE DB\msdaipp.dll (Microsoft Corporation)
Handler-x32: https\0x00000001 - {E1D2BF42-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files (x86)\Common Files\SYSTEM\OLE DB\msdaipp.dll (Microsoft Corporation)
Handler-x32: https\oledb - {E1D2BF40-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files (x86)\Common Files\SYSTEM\OLE DB\msdaipp.dll (Microsoft Corporation)
Handler-x32: msdaipp\0x00000001 - {E1D2BF42-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files (x86)\Common Files\SYSTEM\OLE DB\msdaipp.dll (Microsoft Corporation)
Handler-x32: msdaipp\oledb - {E1D2BF40-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files (x86)\Common Files\SYSTEM\OLE DB\msdaipp.dll (Microsoft Corporation)
Filter: text/xml - {807553E5-5146-11D5-A672-00B0D022E945} -  No File
Hosts: There are more than one entry in Hosts. See Hosts section of Addition.txt
Tcpip\Parameters: [DhcpNameServer] 192.168.1.1 68.237.161.12

FireFox:
========
FF Plugin-x32: @java.com/DTPlugin,version=10.5.1 -> C:\Windows\SysWOW64\npDeployJava1.dll (Oracle Corporation)
FF Plugin-x32: @Microsoft.com/NpCtrl,version=1.0 -> c:\Program Files (x86)\Microsoft Silverlight\5.1.30514.0\npctrl.dll ( Microsoft Corporation)
FF Plugin-x32: @microsoft.com/WPF,version=3.5 -> c:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\NPWPF.dll (Microsoft Corporation)
FF Plugin-x32: @nexon.net/NxGame -> C:\ProgramData\NexonUS\NGM\npNxGameUS.dll (Nexon)
FF Plugin-x32: @perfectworld.com/npArcPlayNowPlugin -> C:\Program Files (x86)\Perfect World Entertainment\Arc\Plugins\npArcPluginFF.dll (Perfect World Entertainment Inc)
FF Plugin-x32: @soe.sony.com/installer,version=1.0.3 -> C:\Windows\Downloaded Program Files\npsoe.dll ()
FF Plugin-x32: Adobe Reader -> C:\Program Files (x86)\Adobe\Reader 10.0\Reader\AIR\nppdf32.dll (Adobe Systems Inc.)
FF HKLM-x32\...\Firefox\Extensions: [{20a82645-c095-46ed-80e3-08825760534b}] - C:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension
FF Extension: Microsoft .NET Framework Assistant - C:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension [2011-09-13]

Chrome:
=======

==================== Services (Whitelisted) =================

(If an entry is included in the fixlist, the service will be removed from the registry. The file will not be moved unless listed separately.)

S4 ArcService; C:\Program Files (x86)\Perfect World Entertainment\Arc\ArcService.exe [88424 2013-09-05] (Perfect World Entertainment Inc)
S4 Creative Audio Engine Licensing Service; C:\Program Files (x86)\Common Files\Creative Labs Shared\Service\CTAELicensing.exe [79360 2011-09-13] (Creative Labs) [File not signed]
S3 hpqcxs08; C:\Program Files (x86)\HP\Digital Imaging\bin\hpqcxs08.dll [217088 2007-11-06] (Hewlett-Packard Co.) [File not signed]
S3 hpqddsvc; C:\Program Files (x86)\HP\Digital Imaging\bin\hpqddsvc.dll [139264 2007-11-06] (Hewlett-Packard Co.) [File not signed]
R2 MsMpSvc; c:\Program Files\Microsoft Security Client\MsMpEng.exe [23808 2014-03-11] (Microsoft Corporation)
S4 Net Driver HPZ12; C:\Windows\system32\HPZinw12.dll [69632 2006-11-08] (Hewlett-Packard) [File not signed]
R3 NisSrv; c:\Program Files\Microsoft Security Client\NisSrv.exe [347872 2014-03-11] (Microsoft Corporation)
S4 Pml Driver HPZ12; C:\Windows\system32\HPZipm12.dll [88064 2006-11-08] (Hewlett-Packard) [File not signed]

==================== Drivers (Whitelisted) ====================

(If an entry is included in the fixlist, the service will be removed from the registry. The file will not be moved unless listed separately.)

R0 MpFilter; C:\Windows\System32\DRIVERS\MpFilter.sys [268512 2014-01-25] (Microsoft Corporation)
R2 NisDrv; C:\Windows\System32\DRIVERS\NisDrvWFP.sys [133928 2014-03-11] (Microsoft Corporation)
S3 EagleX64; \??\C:\Windows\system32\drivers\EagleX64.sys [X]
S3 IpInIp; system32\DRIVERS\ipinip.sys [X]
S3 NwlnkFlt; system32\DRIVERS\nwlnkflt.sys [X]
S3 NwlnkFwd; system32\DRIVERS\nwlnkfwd.sys [X]

==================== NetSvcs (Whitelisted) ===================

(If an item is included in the fixlist, it will be removed from the registry. Any associated file could be listed separately to be moved.)

==================== One Month Created Files and Folders ========

(If an entry is included in the fixlist, the file\folder will be moved.)

2014-08-08 15:50 - 2014-08-08 15:50 - 00009629 _____ () C:\Users\Allison\Desktop\FRST.txt
2014-08-08 15:48 - 2014-08-08 15:48 - 02094080 _____ (Farbar) C:\Users\Allison\Desktop\FRST64.exe
2014-08-08 15:44 - 2014-08-08 15:44 - 00699056 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerApp.exe
2014-08-08 15:44 - 2014-08-08 15:44 - 00071344 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerCPLApp.cpl
2014-08-08 15:41 - 2014-08-08 15:41 - 00001927 _____ () C:\Users\Public\Desktop\Adobe Reader X.lnk
2014-08-08 15:41 - 2014-08-08 15:41 - 00001804 _____ () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Adobe Reader X.lnk
2014-08-08 15:22 - 2014-08-08 15:22 - 00854410 _____ () C:\Users\Allison\Desktop\SecurityCheck.exe
2014-08-06 14:17 - 2014-08-06 14:17 - 00000077 _____ () C:\Users\Allison\Desktop\ESET SCAN.txt
2014-08-06 13:18 - 2014-08-06 13:18 - 00000000 ____D () C:\Program Files (x86)\ESET
2014-08-06 13:13 - 2014-08-06 13:13 - 00000644 _____ () C:\Users\Allison\Desktop\JRT.txt
2014-08-06 12:39 - 2014-08-08 10:56 - 00122584 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2014-08-06 12:39 - 2014-08-06 12:39 - 00000946 _____ () C:\Users\Public\Desktop\Malwarebytes Anti-Malware.lnk
2014-08-06 12:39 - 2014-08-06 12:39 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Malwarebytes Anti-Malware
2014-08-06 12:39 - 2014-08-06 12:39 - 00000000 ____D () C:\Program Files (x86)\Malwarebytes Anti-Malware
2014-08-06 12:39 - 2014-05-12 07:26 - 00091352 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbamchameleon.sys
2014-08-06 12:39 - 2014-05-12 07:26 - 00064216 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mwac.sys
2014-08-06 12:39 - 2014-05-12 07:25 - 00025816 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbam.sys
2014-08-06 10:45 - 2014-08-06 10:45 - 01361309 _____ () C:\Users\Allison\Downloads\AdwCleaner (1).exe
2014-08-05 20:39 - 2014-08-05 20:39 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Microsoft Silverlight
2014-08-05 20:38 - 2014-08-05 20:38 - 00000000 ____D () C:\Program Files (x86)\Microsoft Silverlight
2014-08-05 20:34 - 2014-08-05 20:34 - 13087456 _____ (Microsoft Corporation) C:\Users\Allison\Downloads\Silverlight_x64.exe
2014-08-05 12:36 - 2014-06-06 22:59 - 02339328 _____ (Microsoft Corporation) C:\Windows\system32\jscript9.dll
2014-08-05 12:36 - 2014-06-06 22:51 - 01392128 _____ (Microsoft Corporation) C:\Windows\system32\wininet.dll
2014-08-05 12:36 - 2014-06-06 22:47 - 00085504 _____ (Microsoft Corporation) C:\Windows\system32\jsproxy.dll
2014-08-05 12:36 - 2014-06-06 22:42 - 00282112 _____ (Microsoft Corporation) C:\Windows\system32\dxtrans.dll
2014-08-05 12:36 - 2014-06-06 22:40 - 02382848 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.tlb
2014-08-05 12:36 - 2014-06-06 20:05 - 12353024 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.dll
2014-08-05 12:36 - 2014-06-06 19:12 - 01810432 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript9.dll
2014-08-05 12:36 - 2014-06-06 19:02 - 01129472 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wininet.dll
2014-08-05 12:36 - 2014-06-06 18:56 - 00717824 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript.dll
2014-08-05 12:36 - 2014-06-06 18:56 - 00421376 _____ (Microsoft Corporation) C:\Windows\SysWOW64\vbscript.dll
2014-08-05 12:36 - 2014-06-06 18:54 - 00353792 _____ (Microsoft Corporation) C:\Windows\SysWOW64\dxtmsft.dll
2014-08-05 12:36 - 2014-06-06 18:54 - 00223232 _____ (Microsoft Corporation) C:\Windows\SysWOW64\dxtrans.dll
2014-08-05 12:36 - 2014-06-06 18:53 - 00073728 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtmled.dll
2014-08-05 12:36 - 2014-06-06 18:52 - 02382848 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.tlb
2014-08-05 12:36 - 2014-06-06 18:47 - 00176640 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieui.dll
2014-08-05 12:35 - 2014-06-07 00:02 - 17854464 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.dll
2014-08-05 12:35 - 2014-06-06 23:13 - 10890752 _____ (Microsoft Corporation) C:\Windows\system32\ieframe.dll
2014-08-05 12:35 - 2014-06-06 22:52 - 01348608 _____ (Microsoft Corporation) C:\Windows\system32\urlmon.dll
2014-08-05 12:35 - 2014-06-06 22:51 - 01494016 _____ (Microsoft Corporation) C:\Windows\system32\inetcpl.cpl
2014-08-05 12:35 - 2014-06-06 22:50 - 00237056 _____ (Microsoft Corporation) C:\Windows\system32\url.dll
2014-08-05 12:35 - 2014-06-06 22:45 - 00816640 _____ (Microsoft Corporation) C:\Windows\system32\jscript.dll
2014-08-05 12:35 - 2014-06-06 22:45 - 00599040 _____ (Microsoft Corporation) C:\Windows\system32\vbscript.dll
2014-08-05 12:35 - 2014-06-06 22:45 - 00173056 _____ (Microsoft Corporation) C:\Windows\system32\ieUnatt.exe
2014-08-05 12:35 - 2014-06-06 22:42 - 02148352 _____ (Microsoft Corporation) C:\Windows\system32\iertutil.dll
2014-08-05 12:35 - 2014-06-06 22:42 - 00729088 _____ (Microsoft Corporation) C:\Windows\system32\msfeeds.dll
2014-08-05 12:35 - 2014-06-06 22:42 - 00453120 _____ (Microsoft Corporation) C:\Windows\system32\dxtmsft.dll
2014-08-05 12:35 - 2014-06-06 22:41 - 00096768 _____ (Microsoft Corporation) C:\Windows\system32\mshtmled.dll
2014-08-05 12:35 - 2014-06-06 22:41 - 00055296 _____ (Microsoft Corporation) C:\Windows\system32\msfeedsbs.dll
2014-08-05 12:35 - 2014-06-06 22:41 - 00011264 _____ (Microsoft Corporation) C:\Windows\system32\msfeedssync.exe
2014-08-05 12:35 - 2014-06-06 22:39 - 00012800 _____ (Microsoft Corporation) C:\Windows\system32\mshta.exe
2014-08-05 12:35 - 2014-06-06 22:35 - 00248320 _____ (Microsoft Corporation) C:\Windows\system32\ieui.dll
2014-08-05 12:35 - 2014-06-06 20:33 - 02777088 _____ (Microsoft Corporation) C:\Windows\system32\win32k.sys
2014-08-05 12:35 - 2014-06-06 19:25 - 09711616 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieframe.dll
2014-08-05 12:35 - 2014-06-06 19:04 - 01106432 _____ (Microsoft Corporation) C:\Windows\SysWOW64\urlmon.dll
2014-08-05 12:35 - 2014-06-06 19:03 - 01427968 _____ (Microsoft Corporation) C:\Windows\SysWOW64\inetcpl.cpl
2014-08-05 12:35 - 2014-06-06 19:00 - 00231936 _____ (Microsoft Corporation) C:\Windows\SysWOW64\url.dll
2014-08-05 12:35 - 2014-06-06 18:58 - 00065024 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jsproxy.dll
2014-08-05 12:35 - 2014-06-06 18:57 - 00142848 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieUnatt.exe
2014-08-05 12:35 - 2014-06-06 18:54 - 00607744 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msfeeds.dll
2014-08-05 12:35 - 2014-06-06 18:54 - 00041472 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msfeedsbs.dll
2014-08-05 12:35 - 2014-06-06 18:53 - 01796096 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iertutil.dll
2014-08-05 12:35 - 2014-06-06 18:53 - 00010752 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msfeedssync.exe
2014-08-05 12:35 - 2014-06-06 18:51 - 00011776 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshta.exe
2014-08-05 12:35 - 2014-06-06 04:59 - 00506880 _____ (Microsoft Corporation) C:\Windows\SysWOW64\qedit.dll
2014-08-05 12:35 - 2014-06-06 03:13 - 00620032 _____ (Microsoft Corporation) C:\Windows\system32\qedit.dll
2014-08-05 12:35 - 2014-05-30 03:10 - 00404992 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\afd.sys
2014-08-05 05:02 - 2014-08-05 05:02 - 01016261 _____ (Thisisu) C:\Users\Allison\Downloads\JRT.exe
2014-08-05 02:03 - 2014-08-05 02:03 - 01361309 _____ () C:\Users\Allison\Downloads\AdwCleaner.exe
2014-08-03 17:04 - 2014-08-03 17:04 - 00002046 _____ () C:\Users\Allison\Downloads\ninja_forms_subs_08-03-2014 (1).csv
2014-08-03 17:02 - 2014-08-03 17:02 - 00153008 _____ () C:\Users\Allison\Downloads\ninja_forms_subs_08-03-2014.csv
2014-08-03 14:09 - 2014-08-03 14:09 - 00000443 _____ () C:\Users\Allison\Desktop\guild missions.txt
2014-08-01 02:46 - 2014-08-01 02:46 - 00000295 _____ () C:\Users\Allison\Desktop\Irreversible Effects of Previous Cortisol Excess on Cognitive Functions in Cushing’s Disease  Laika's MedLibLog.url
2014-07-31 14:43 - 2014-08-05 15:40 - 00000000 ____D () C:\Users\Allison\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Steam
2014-07-30 17:59 - 2014-08-04 15:57 - 00000000 ____D () C:\Users\Allison\Documents\ArcheAge
2014-07-30 17:59 - 2014-07-30 17:59 - 00000000 ____D () C:\ArcheAge
2014-07-30 16:15 - 2014-07-30 16:15 - 00001729 _____ () C:\Users\Allison\Desktop\Archeage Beta.lnk
2014-07-30 13:16 - 2014-07-30 16:15 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Glyph
2014-07-30 13:16 - 2014-07-30 13:16 - 31341680 _____ (Trion Worlds Inc.) C:\Users\Allison\Downloads\GlyphInstall (3).exe
2014-07-30 13:16 - 2014-07-30 13:16 - 00000783 _____ () C:\Users\Allison\Desktop\Glyph.lnk
2014-07-30 13:10 - 2014-07-30 13:17 - 00000000 ____D () C:\Users\Allison\AppData\Local\Glyph
2014-07-30 12:58 - 2014-07-30 12:58 - 31341680 _____ (Trion Worlds Inc.) C:\Users\Allison\Downloads\GlyphInstall (2).exe
2014-07-30 12:36 - 2014-07-30 12:36 - 00001079 _____ () C:\Users\Allison\Desktop\Glyph - Shortcut.lnk
2014-07-30 12:19 - 2014-07-30 12:19 - 31341680 _____ (Trion Worlds Inc.) C:\Users\Allison\Downloads\GlyphInstall (1).exe
2014-07-30 12:15 - 2014-07-30 17:21 - 00000000 ____D () C:\Program Files (x86)\Glyph
2014-07-30 12:15 - 2014-07-30 12:15 - 00000000 ____D () C:\ProgramData\Glyph
2014-07-30 12:14 - 2014-07-30 12:14 - 31341680 _____ (Trion Worlds Inc.) C:\Users\Allison\Downloads\GlyphInstall.exe
2014-07-24 19:45 - 2014-07-24 19:46 - 00273840 _____ () C:\Windows\Minidump\Mini072414-01.dmp
2014-07-19 12:41 - 2014-07-19 12:41 - 00532327 _____ () C:\Users\Allison\Downloads\ninja_forms_subs_07-19-2014.csv
2014-07-16 19:46 - 2014-07-16 19:46 - 00000081 _____ () C:\Users\Allison\Desktop\Brian's Youtube Channel.url

==================== One Month Modified Files and Folders =======

(If an entry is included in the fixlist, the file\folder will be moved.)

2014-08-08 15:50 - 2014-08-08 15:50 - 00009629 _____ () C:\Users\Allison\Desktop\FRST.txt
2014-08-08 15:50 - 2014-05-09 16:15 - 00000000 ____D () C:\FRST
2014-08-08 15:48 - 2014-08-08 15:48 - 02094080 _____ (Farbar) C:\Users\Allison\Desktop\FRST64.exe
2014-08-08 15:44 - 2014-08-08 15:44 - 00699056 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerApp.exe
2014-08-08 15:44 - 2014-08-08 15:44 - 00071344 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerCPLApp.cpl
2014-08-08 15:41 - 2014-08-08 15:41 - 00001927 _____ () C:\Users\Public\Desktop\Adobe Reader X.lnk
2014-08-08 15:41 - 2014-08-08 15:41 - 00001804 _____ () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Adobe Reader X.lnk
2014-08-08 15:41 - 2011-09-16 17:11 - 00000000 ____D () C:\ProgramData\Adobe
2014-08-08 15:41 - 2011-09-16 17:11 - 00000000 ____D () C:\Program Files (x86)\Adobe
2014-08-08 15:27 - 2014-03-14 20:35 - 00000000 ____D () C:\Windows\SysWOW64\Adobe
2014-08-08 15:22 - 2014-08-08 15:22 - 00854410 _____ () C:\Users\Allison\Desktop\SecurityCheck.exe
2014-08-08 14:43 - 2011-10-10 15:05 - 38289408 _____ () C:\Users\Allison\Desktop\Allison.pst
2014-08-08 14:43 - 2006-11-02 08:46 - 00777318 _____ () C:\Windows\system32\PerfStringBackup.INI
2014-08-08 14:40 - 2008-01-20 21:53 - 01691103 _____ () C:\Windows\WindowsUpdate.log
2014-08-08 14:37 - 2006-11-02 11:22 - 00004112 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-1.C7483456-A289-439d-8115-601632D005A0
2014-08-08 14:37 - 2006-11-02 11:22 - 00004112 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-0.C7483456-A289-439d-8115-601632D005A0
2014-08-08 14:36 - 2006-11-02 11:42 - 00000006 ____H () C:\Windows\Tasks\SA.DAT
2014-08-08 12:28 - 2011-09-12 19:01 - 00000732 _____ () C:\Users\Allison\AppData\Local\d3d9caps64.dat
2014-08-08 10:56 - 2014-08-06 12:39 - 00122584 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2014-08-08 10:47 - 2006-11-02 11:42 - 00032648 _____ () C:\Windows\Tasks\SCHEDLGU.TXT
2014-08-08 10:43 - 2012-01-13 22:56 - 00000000 ____D () C:\Program Files (x86)\Steam
2014-08-06 20:55 - 2006-11-02 11:27 - 00031065 _____ () C:\Windows\setupact.log
2014-08-06 14:17 - 2014-08-06 14:17 - 00000077 _____ () C:\Users\Allison\Desktop\ESET SCAN.txt
2014-08-06 13:18 - 2014-08-06 13:18 - 00000000 ____D () C:\Program Files (x86)\ESET
2014-08-06 13:13 - 2014-08-06 13:13 - 00000644 _____ () C:\Users\Allison\Desktop\JRT.txt
2014-08-06 13:06 - 2008-01-20 23:26 - 00503614 _____ () C:\Windows\PFRO.log
2014-08-06 13:05 - 2014-05-12 08:37 - 00000000 ____D () C:\AdwCleaner
2014-08-06 12:39 - 2014-08-06 12:39 - 00000946 _____ () C:\Users\Public\Desktop\Malwarebytes Anti-Malware.lnk
2014-08-06 12:39 - 2014-08-06 12:39 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Malwarebytes Anti-Malware
2014-08-06 12:39 - 2014-08-06 12:39 - 00000000 ____D () C:\Program Files (x86)\Malwarebytes Anti-Malware
2014-08-06 11:18 - 2014-06-07 19:31 - 00000000 ____D () C:\Users\Allison\AppData\Local\NCSOFT
2014-08-06 11:17 - 2013-09-18 11:38 - 00000000 ____D () C:\Program Files (x86)\Mumble
2014-08-06 11:04 - 2012-05-08 23:35 - 00000000 ____D () C:\Program Files (x86)\Google
2014-08-06 11:04 - 2011-09-16 12:32 - 00000000 ____D () C:\Users\Allison\AppData\Local\Google
2014-08-06 11:04 - 2011-09-12 19:02 - 00000910 _____ () C:\Users\Allison\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Internet Explorer.lnk
2014-08-06 10:45 - 2014-08-06 10:45 - 01361309 _____ () C:\Users\Allison\Downloads\AdwCleaner (1).exe
2014-08-05 20:39 - 2014-08-05 20:39 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Microsoft Silverlight
2014-08-05 20:38 - 2014-08-05 20:38 - 00000000 ____D () C:\Program Files (x86)\Microsoft Silverlight
2014-08-05 20:34 - 2014-08-05 20:34 - 13087456 _____ (Microsoft Corporation) C:\Users\Allison\Downloads\Silverlight_x64.exe
2014-08-05 16:09 - 2011-09-13 18:34 - 00000000 ____D () C:\Users\Allison\AppData\Local\Deployment
2014-08-05 16:02 - 2014-01-23 21:47 - 00000000 ____D () C:\Program Files (x86)\RaidCall
2014-08-05 15:40 - 2014-07-31 14:43 - 00000000 ____D () C:\Users\Allison\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Steam
2014-08-05 14:38 - 2011-09-12 19:01 - 00000000 ____D () C:\Users\Allison
2014-08-05 12:48 - 2006-11-02 11:21 - 00255592 _____ () C:\Windows\system32\FNTCACHE.DAT
2014-08-05 12:39 - 2014-05-08 14:55 - 00000000 ____D () C:\Windows\system32\MRT
2014-08-05 05:02 - 2014-08-05 05:02 - 01016261 _____ (Thisisu) C:\Users\Allison\Downloads\JRT.exe
2014-08-05 02:03 - 2014-08-05 02:03 - 01361309 _____ () C:\Users\Allison\Downloads\AdwCleaner.exe
2014-08-05 01:59 - 2014-03-06 23:53 - 00000000 ____D () C:\Users\Allison\AppData\Roaming\Malwarebytes
2014-08-05 01:59 - 2014-03-06 23:53 - 00000000 ____D () C:\ProgramData\Malwarebytes
2014-08-04 15:57 - 2014-07-30 17:59 - 00000000 ____D () C:\Users\Allison\Documents\ArcheAge
2014-08-03 17:42 - 2013-09-29 01:44 - 00000000 ____D () C:\Users\Allison\AppData\Roaming\TS3Client
2014-08-03 17:04 - 2014-08-03 17:04 - 00002046 _____ () C:\Users\Allison\Downloads\ninja_forms_subs_08-03-2014 (1).csv
2014-08-03 17:02 - 2014-08-03 17:02 - 00153008 _____ () C:\Users\Allison\Downloads\ninja_forms_subs_08-03-2014.csv
2014-08-03 14:09 - 2014-08-03 14:09 - 00000443 _____ () C:\Users\Allison\Desktop\guild missions.txt
2014-08-01 02:46 - 2014-08-01 02:46 - 00000295 _____ () C:\Users\Allison\Desktop\Irreversible Effects of Previous Cortisol Excess on Cognitive Functions in Cushing’s Disease  Laika's MedLibLog.url
2014-07-30 17:59 - 2014-07-30 17:59 - 00000000 ____D () C:\ArcheAge
2014-07-30 17:21 - 2014-07-30 12:15 - 00000000 ____D () C:\Program Files (x86)\Glyph
2014-07-30 16:15 - 2014-07-30 16:15 - 00001729 _____ () C:\Users\Allison\Desktop\Archeage Beta.lnk
2014-07-30 16:15 - 2014-07-30 13:16 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Glyph
2014-07-30 13:17 - 2014-07-30 13:10 - 00000000 ____D () C:\Users\Allison\AppData\Local\Glyph
2014-07-30 13:16 - 2014-07-30 13:16 - 31341680 _____ (Trion Worlds Inc.) C:\Users\Allison\Downloads\GlyphInstall (3).exe
2014-07-30 13:16 - 2014-07-30 13:16 - 00000783 _____ () C:\Users\Allison\Desktop\Glyph.lnk
2014-07-30 12:58 - 2014-07-30 12:58 - 31341680 _____ (Trion Worlds Inc.) C:\Users\Allison\Downloads\GlyphInstall (2).exe
2014-07-30 12:36 - 2014-07-30 12:36 - 00001079 _____ () C:\Users\Allison\Desktop\Glyph - Shortcut.lnk
2014-07-30 12:19 - 2014-07-30 12:19 - 31341680 _____ (Trion Worlds Inc.) C:\Users\Allison\Downloads\GlyphInstall (1).exe
2014-07-30 12:15 - 2014-07-30 12:15 - 00000000 ____D () C:\ProgramData\Glyph
2014-07-30 12:14 - 2014-07-30 12:14 - 31341680 _____ (Trion Worlds Inc.) C:\Users\Allison\Downloads\GlyphInstall.exe
2014-07-24 19:46 - 2014-07-24 19:45 - 00273840 _____ () C:\Windows\Minidump\Mini072414-01.dmp
2014-07-24 19:45 - 2012-08-14 21:18 - 00000000 ____D () C:\Windows\Minidump
2014-07-19 12:41 - 2014-07-19 12:41 - 00532327 _____ () C:\Users\Allison\Downloads\ninja_forms_subs_07-19-2014.csv
2014-07-16 19:46 - 2014-07-16 19:46 - 00000081 _____ () C:\Users\Allison\Desktop\Brian's Youtube Channel.url
2014-07-16 10:49 - 2012-06-19 11:36 - 00026112 _____ () C:\Users\Allison\Desktop\current medications.xls

Some content of TEMP:
====================
C:\Users\Allison\AppData\Local\Temp\drm_dyndata_7400006.dll
C:\Users\Allison\AppData\Local\Temp\Quarantine.exe

==================== Bamital & volsnap Check =================

(There is no automatic fix for files that do not pass verification.)

C:\Windows\System32\winlogon.exe => File is digitally signed
C:\Windows\System32\wininit.exe => File is digitally signed
C:\Windows\SysWOW64\wininit.exe => File is digitally signed
C:\Windows\explorer.exe => File is digitally signed
C:\Windows\SysWOW64\explorer.exe => File is digitally signed
C:\Windows\System32\svchost.exe => File is digitally signed
C:\Windows\SysWOW64\svchost.exe => File is digitally signed
C:\Windows\System32\services.exe => File is digitally signed
C:\Windows\System32\User32.dll => File is digitally signed
C:\Windows\SysWOW64\User32.dll => File is digitally signed
C:\Windows\System32\userinit.exe => File is digitally signed
C:\Windows\SysWOW64\userinit.exe => File is digitally signed
C:\Windows\System32\rpcss.dll => File is digitally signed
C:\Windows\System32\Drivers\volsnap.sys => File is digitally signed

LastRegBack: 2014-08-08 14:44

==================== End Of Log ============================

 

 

Link to post
Share on other sites

Sorry, #1 was supposed to say:

 

1. Both Malwarebytes and Microsoft security essential scans will (randomly) either stop midway and never complete or show as complete with 0 errors found after only 5 minutes. Usually my full scans complete without issue and take at least 50-70 minutes.

Link to post
Share on other sites

Hello and post-32477-1261866970.gif

 

P2P/Piracy Warning:

 

If you're using Peer 2 Peer software such as uTorrent, BitTorrent or similar you must either fully uninstall them or completely disable them from running while being assisted here.Failure to remove or disable such software will result in your topic being closed and no further assistance being provided.If you have illegal/cracked software, cracks, keygens etc. on the system, please remove or uninstall them now and read the policy on Piracy.

 

Read the following link before we continue and run Combofix:

 

ComboFix usage, Questions, Help? - Look here

 

Next,

 

Delete any versions of Combofix that you may have on your Desktop, download a fresh copy from either of the following links :-

 

http://download.bleepingcomputer.com/sUBs/ComboFix.exe

 

http://www.infospyware.net/antimalware/combofix/

 

  • Ensure that Combofix is saved directly to the Desktop <--- Very important
     
  • Disable all security programs as they will have a negative effect on Combofix, instructions available here  http://www.bleepingcomputer.com/forums/topic114351.html if required. Be aware the list may not have all programs listed, if you need more help please ask.
     
  • Close any open browsers and any other programs you might have running
     
  • Double click the combofix.gif icon to run the tool (Vista or Windows 7 users right click and select "Run as Administrator)
     
  • Instructions for running Combofix available here http://www.bleepingcomputer.com/combofix/how-to-use-combofix if required.
     
  • If you are using windows XP It might display a pop up saying that "Recovery console is not installed, do you want to install?" Please select yes & let it download the files it needs to do this. Once the recovery console is installed Combofix will then offer to scan for malware. Select continue or yes.
     
  • When finished, it will produce a report for you. Please post the "C:\ComboFix.txt" for further review

 

****Note: Do not mouseclick combofix's window while it's running. That may cause it to stall or freeze ****

 

Note: ComboFix may reset a number of Internet Explorer's settings, including making it the default browser.

Note: Combofix prevents autorun of ALL CDs, floppies and USB devices to assist with malware removal & increase security. If this is an issue or makes it difficult for you -- please tell us when you reply. Read here  http://thespykiller.co.uk/index.php?page=20 why  disabling autoruns is recommended.

 

*EXTRA NOTES*


    If Combofix detects any Rootkit/Bootkit activity on your system it will give a warning and prompt for a reboot, you must allow it to do so.
    If Combofix reboot's due to a rootkit, the screen may stay black for several minutes on reboot, this is normal
    If after running Combofix you receive any type of warning message about registry key's being listed for deletion when trying to open certain items, reboot the system and this will fix the issue (Those items will not be deleted)

 

Post the log in next reply please...

 

Kevin

Link to post
Share on other sites

Thank you.  Here is the log:

 

ComboFix 14-08-14.02 - Allison 08/14/2014  11:34:28.1.4 - x64
Microsoft® Windows Vista™ Home Premium   6.0.6002.2.1252.1.1033.18.8190.6256 [GMT -4:00]
Running from: c:\users\Allison\Desktop\ComboFix.exe
AV: Microsoft Security Essentials *Disabled/Updated* {641105E6-77ED-3F35-A304-765193BCB75F}
SP: Microsoft Security Essentials *Disabled/Updated* {DF70E402-51D7-30BB-99B4-4D23E83BFDE2}
SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\windows\SysWow64\tmpBBDF.tmp
.
.
(((((((((((((((((((((((((   Files Created from 2014-07-14 to 2014-08-14  )))))))))))))))))))))))))))))))
.
.
2014-08-14 15:07 . 2014-06-26 22:17 171152 ----a-w- c:\windows\system32\infocardapi.dll
2014-08-14 15:07 . 2014-06-26 22:17 1389200 ----a-w- c:\windows\system32\icardagt.exe
2014-08-14 15:07 . 2014-06-26 22:17 99480 ----a-w- c:\windows\SysWow64\infocardapi.dll
2014-08-14 15:07 . 2014-06-26 22:17 8856 ----a-w- c:\windows\SysWow64\icardres.dll
2014-08-14 15:07 . 2014-06-26 22:17 619664 ----a-w- c:\windows\SysWow64\icardagt.exe
2014-08-14 15:07 . 2014-06-26 22:17 8848 ----a-w- c:\windows\system32\icardres.dll
2014-08-14 15:07 . 2014-06-06 04:29 35480 ----a-w- c:\windows\system32\TsWpfWrp.exe
2014-08-14 15:07 . 2014-06-06 04:28 35480 ----a-w- c:\windows\SysWow64\TsWpfWrp.exe
2014-08-14 15:05 . 2014-07-24 19:05 483328 ----a-w- c:\program files\Internet Explorer\ieinstal.exe
2014-08-14 08:23 . 2014-07-02 03:09 10924376 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{7AEC7EB1-09A7-4989-AAF5-388AF1669338}\mpengine.dll
2014-08-13 10:42 . 2014-05-02 16:50 1031560 ------w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{F3F3F3FE-F4E0-4A1E-8AD2-C6BAF29ED900}\gapaengine.dll
2014-08-13 10:37 . 2014-07-02 03:09 10924376 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll
2014-08-09 02:22 . 2014-08-09 02:22 -------- d-----w- c:\program files (x86)\Microsoft Silverlight
2014-08-08 19:44 . 2014-08-08 19:44 71344 ----a-w- c:\windows\SysWow64\FlashPlayerCPLApp.cpl
2014-08-08 19:44 . 2014-08-08 19:44 699056 ----a-w- c:\windows\SysWow64\FlashPlayerApp.exe
2014-08-08 19:41 . 2014-08-08 19:41 -------- d-----w- c:\program files (x86)\Common Files\Adobe
2014-08-06 17:18 . 2014-08-06 17:18 -------- d-----w- c:\program files (x86)\ESET
2014-08-06 16:39 . 2014-08-08 14:56 122584 ----a-w- c:\windows\system32\drivers\MBAMSwissArmy.sys
2014-08-06 16:39 . 2014-08-06 16:39 -------- d-----w- c:\program files (x86)\Malwarebytes Anti-Malware
2014-08-06 16:39 . 2014-05-12 11:26 64216 ----a-w- c:\windows\system32\drivers\mwac.sys
2014-08-06 16:39 . 2014-05-12 11:26 91352 ----a-w- c:\windows\system32\drivers\mbamchameleon.sys
2014-08-06 16:39 . 2014-05-12 11:25 25816 ----a-w- c:\windows\system32\drivers\mbam.sys
2014-08-05 16:36 . 2014-06-02 21:29 1435136 ----a-w- c:\program files\Common Files\Microsoft Shared\ink\journal.dll
2014-08-05 16:36 . 2014-06-02 10:30 937472 ----a-w- c:\program files (x86)\Common Files\Microsoft Shared\ink\journal.dll
2014-08-05 16:35 . 2014-06-06 08:59 506880 ----a-w- c:\windows\SysWow64\qedit.dll
2014-08-05 16:35 . 2014-06-06 07:13 620032 ----a-w- c:\windows\system32\qedit.dll
2014-08-05 16:35 . 2014-05-30 07:10 404992 ----a-w- c:\windows\system32\drivers\afd.sys
2014-07-30 21:59 . 2014-07-30 21:59 -------- d-----w- C:\ArcheAge
2014-07-30 17:10 . 2014-07-30 17:17 -------- d-----w- c:\users\Allison\AppData\Local\Glyph
2014-07-30 16:15 . 2014-07-30 16:15 -------- d-----w- c:\programdata\Glyph
2014-07-30 16:15 . 2014-08-13 05:18 -------- d-----w- c:\program files (x86)\Glyph
2014-07-24 23:43 . 2013-12-19 21:17 4019992 -c--a-w- c:\programdata\Microsoft\Windows\WER\ReportQueue\Report21dcf088\GTLite.exe
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2014-08-14 15:14 . 2006-11-02 12:35 99218768 ----a-w- c:\windows\system32\mrt.exe
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown 
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]
"Adobe ARM"="c:\program files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-07-27 919008]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
"EnableSecureUIAPath"= 1 (0x1)
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WudfSvc]
@="Service"
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - WS2IFSL
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\svchost]
hpdevmgmt REG_MULTI_SZ   hpqcxs08 hpqddsvc
.
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Svchost  - NetSvcs
Themes
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
2014-08-14 06:41 1104200 ----a-w- c:\program files (x86)\Google\Chrome\Application\36.0.1985.143\Installer\chrmstp.exe
.
Contents of the 'Scheduled Tasks' folder
.
2014-08-14 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2014-08-09 02:35]
.
2014-08-14 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2014-08-09 02:35]
.
.
--------- X64 Entries -----------
.
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MSC"="c:\program files\Microsoft Security Client\msseces.exe" [2014-03-11 1271072]
.
------- Supplementary Scan -------
.
uLocal Page = c:\windows\system32\blank.htm
mLocal Page = c:\windows\system32\blank.htm
uInternet Settings,ProxyOverride = <local>
Trusted Zone: amazon.com\www
Trusted Zone: backpaintest.org\www
Trusted Zone: clonewarsadventures.com
Trusted Zone: freerealms.com
Trusted Zone: internetgrill.com\www
Trusted Zone: medicare.gov\www
Trusted Zone: medscape.com\login
Trusted Zone: mywebgrocer.com\shoprite
Trusted Zone: soe.com
Trusted Zone: sony.com
TCP: DhcpNameServer = 192.168.1.1 68.237.161.12
DPF: {E705A591-DA3C-4228-B0D5-A356DBA42FBF} - hxxp://ccfiles.creative.com/Web/softwareupdate/su2/ocx/20015/CTSUEng.cab
.
- - - - ORPHANS REMOVED - - - -
.
Toolbar-Locked - (no file)
SafeBoot-WudfPf
SafeBoot-WudfRd
AddRemove-Adobe Flash Player ActiveX - c:\windows\SysWOW64\Macromed\Flash\FlashUtil32_14_0_0_145_ActiveX.exe
.
.
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_14_0_0_145_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_14_0_0_145_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_14_0_0_145_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_14_0_0_145_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Shockwave Flash Object"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_14_0_0_145.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus]
@="0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID]
@="ShockwaveFlash.ShockwaveFlash.14"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_14_0_0_145.ocx, 1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="ShockwaveFlash.ShockwaveFlash"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Macromedia Flash Factory Object"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_14_0_0_145.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ProgID]
@="FlashFactory.FlashFactory.1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_14_0_0_145.ocx, 1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="FlashFactory.FlashFactory"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}]
@Denied: (A 2) (Everyone)
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}\1.0]
@="Shockwave Flash"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\TypeLib\{FAB3E735-69C7-453B-A446-B6823C6DF1C9}]
@Denied: (A 2) (Everyone)
@=""
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\TypeLib\{FAB3E735-69C7-453B-A446-B6823C6DF1C9}\1.0]
@="FlashBroker"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes]
"SymbolicLinkValue"=hex(6):5c,00,52,00,45,00,47,00,49,00,53,00,54,00,52,00,59,
   00,5c,00,4d,00,41,00,43,00,48,00,49,00,4e,00,45,00,5c,00,53,00,4f,00,46,00,\
.
------------------------ Other Running Processes ------------------------
.
c:\program files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
c:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
.
**************************************************************************
.
Completion time: 2014-08-14  11:46:40 - machine was rebooted
ComboFix-quarantined-files.txt  2014-08-14 15:46
.
Pre-Run: 529,095,794,688 bytes free
Post-Run: 534,157,864,960 bytes free
.
- - End Of File - - BE2EB44A58EB8CEF461087BDB4687C82
5C616939100B85E558DA92B899A0FC36
 
Link to post
Share on other sites

Thanks for the log, continue as follows:

 

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the Codebox below into it:

ClearJavaCache::

 

Save this as CFScript.txt, and as Type: All Files (*.*) in the same location as ComboFix.exe

CF3.jpg

CFScriptB-4.gif

Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.

 

Next,

 

We need to run an online AV scan to ensure there are no remnants of any infection left on your system that may have been missed. This scan is very thorough and well worth running, it can take several hours please be patient and let it complete:

 

Run Eset Online Scanner

 

**Note** You will need to use Internet explorer for this scan - Vista and Windows 7/8 right click on IE shortcut and run as admin

 

Go to Eset web page http://www.eset.com/us/online-scanner/ to run an online scan from ESET.

 


Turn off the real time scanner of any existing antivirus program while performing the online scan
click on the Run ESET Online Scanner button
Tick the box next to YES, I accept the Terms of Use.
Click Start
When asked, allow the add/on to be installed
Click Start
Make sure that the option "Remove found threats"  is ticked
Click on Advanced Settings, ensure the options
Scan for potentially unwanted applications, Scan for potentially unsafe applications, and Enable Anti-Stealth Technology are ticked.
Click Scan
wait for the virus definitions to be downloaded
Wait for the scan to finish

 

When the scan is complete

 


If no threats were found
put a checkmark in "Uninstall application on close"
close program
report to me that nothing was found

 

If threats were found

 


click on "list of threats found"
click on "export to text file" and save it as ESET SCAN and save to the desktop
Click on back
put a checkmark in "Uninstall application on close"
click on finish

 

close program

 

Copy and paste the report in next reply.

 

let me see those two logs in next reply,

 

Kevin

Link to post
Share on other sites

Thank you.

 

When ESET finished, there were two checkboxes to answer, the default setting was to have them unchecked:

 

?Delete quarantine files

?Uninstall application on close

 

You didn't say if I should delete the quarantine so I didn't uninstall the application, yet.  Once I know if I should delete the quarantined I will uninstall application.  Should I delete?

 

COMBOFIX

 

ComboFix 14-08-14.02 - Allison 08/16/2014  12:14:39.2.4 - x64
Microsoft® Windows Vista™ Home Premium   6.0.6002.2.1252.1.1033.18.8190.6737 [GMT -4:00]
Running from: c:\users\Allison\Desktop\ComboFix.exe
Command switches used :: c:\users\Allison\Desktop\CFScript.txt
AV: Microsoft Security Essentials *Disabled/Updated* {641105E6-77ED-3F35-A304-765193BCB75F}
SP: Microsoft Security Essentials *Disabled/Updated* {DF70E402-51D7-30BB-99B4-4D23E83BFDE2}
SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
(((((((((((((((((((((((((   Files Created from 2014-07-16 to 2014-08-16  )))))))))))))))))))))))))))))))
.
.
2014-08-16 16:21 . 2014-08-16 16:21 -------- d-----w- c:\users\Default\AppData\Local\temp
2014-08-16 15:55 . 2014-07-02 03:09 10924376 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{762179B2-46AC-41ED-9A02-E4B6D0F91AE7}\mpengine.dll
2014-08-15 15:57 . 2014-07-02 03:09 10924376 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll
2014-08-14 15:07 . 2014-06-26 22:17 171152 ----a-w- c:\windows\system32\infocardapi.dll
2014-08-14 15:07 . 2014-06-26 22:17 1389200 ----a-w- c:\windows\system32\icardagt.exe
2014-08-14 15:07 . 2014-06-26 22:17 99480 ----a-w- c:\windows\SysWow64\infocardapi.dll
2014-08-14 15:07 . 2014-06-26 22:17 8856 ----a-w- c:\windows\SysWow64\icardres.dll
2014-08-14 15:07 . 2014-06-26 22:17 619664 ----a-w- c:\windows\SysWow64\icardagt.exe
2014-08-14 15:07 . 2014-06-26 22:17 8848 ----a-w- c:\windows\system32\icardres.dll
2014-08-14 15:07 . 2014-06-06 04:29 35480 ----a-w- c:\windows\system32\TsWpfWrp.exe
2014-08-14 15:07 . 2014-06-06 04:28 35480 ----a-w- c:\windows\SysWow64\TsWpfWrp.exe
2014-08-14 15:05 . 2014-07-24 19:05 483328 ----a-w- c:\program files\Internet Explorer\ieinstal.exe
2014-08-13 10:42 . 2014-05-02 16:50 1031560 ------w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{F3F3F3FE-F4E0-4A1E-8AD2-C6BAF29ED900}\gapaengine.dll
2014-08-09 02:22 . 2014-08-09 02:22 -------- d-----w- c:\program files (x86)\Microsoft Silverlight
2014-08-08 19:44 . 2014-08-08 19:44 71344 ----a-w- c:\windows\SysWow64\FlashPlayerCPLApp.cpl
2014-08-08 19:44 . 2014-08-08 19:44 699056 ----a-w- c:\windows\SysWow64\FlashPlayerApp.exe
2014-08-08 19:41 . 2014-08-08 19:41 -------- d-----w- c:\program files (x86)\Common Files\Adobe
2014-08-06 17:18 . 2014-08-06 17:18 -------- d-----w- c:\program files (x86)\ESET
2014-08-06 16:39 . 2014-08-08 14:56 122584 ----a-w- c:\windows\system32\drivers\MBAMSwissArmy.sys
2014-08-06 16:39 . 2014-08-06 16:39 -------- d-----w- c:\program files (x86)\Malwarebytes Anti-Malware
2014-08-06 16:39 . 2014-05-12 11:26 64216 ----a-w- c:\windows\system32\drivers\mwac.sys
2014-08-06 16:39 . 2014-05-12 11:26 91352 ----a-w- c:\windows\system32\drivers\mbamchameleon.sys
2014-08-06 16:39 . 2014-05-12 11:25 25816 ----a-w- c:\windows\system32\drivers\mbam.sys
2014-08-05 16:36 . 2014-06-02 21:29 1435136 ----a-w- c:\program files\Common Files\Microsoft Shared\ink\journal.dll
2014-08-05 16:36 . 2014-06-02 10:30 937472 ----a-w- c:\program files (x86)\Common Files\Microsoft Shared\ink\journal.dll
2014-08-05 16:35 . 2014-06-06 08:59 506880 ----a-w- c:\windows\SysWow64\qedit.dll
2014-08-05 16:35 . 2014-06-06 07:13 620032 ----a-w- c:\windows\system32\qedit.dll
2014-08-05 16:35 . 2014-05-30 07:10 404992 ----a-w- c:\windows\system32\drivers\afd.sys
2014-07-30 21:59 . 2014-07-30 21:59 -------- d-----w- C:\ArcheAge
2014-07-30 17:10 . 2014-07-30 17:17 -------- d-----w- c:\users\Allison\AppData\Local\Glyph
2014-07-30 16:15 . 2014-07-30 16:15 -------- d-----w- c:\programdata\Glyph
2014-07-30 16:15 . 2014-08-13 05:18 -------- d-----w- c:\program files (x86)\Glyph
2014-07-24 23:43 . 2013-12-19 21:17 4019992 -c--a-w- c:\programdata\Microsoft\Windows\WER\ReportQueue\Report21dcf088\GTLite.exe
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2014-08-14 15:14 . 2006-11-02 12:35 99218768 ----a-w- c:\windows\system32\mrt.exe
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]
"Adobe ARM"="c:\program files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-07-27 919008]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
"EnableSecureUIAPath"= 1 (0x1)
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WudfSvc]
@="Service"
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - WS2IFSL
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\svchost]
hpdevmgmt REG_MULTI_SZ    hpqcxs08 hpqddsvc
.
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Svchost  - NetSvcs
Themes
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
2014-08-14 06:41 1104200 ----a-w- c:\program files (x86)\Google\Chrome\Application\36.0.1985.143\Installer\chrmstp.exe
.
Contents of the 'Scheduled Tasks' folder
.
2014-08-16 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2014-08-09 02:35]
.
2014-08-16 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2014-08-09 02:35]
.
.
--------- X64 Entries -----------
.
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MSC"="c:\program files\Microsoft Security Client\msseces.exe" [2014-03-11 1271072]
.
------- Supplementary Scan -------
.
uLocal Page = c:\windows\system32\blank.htm
mLocal Page = c:\windows\system32\blank.htm
uInternet Settings,ProxyOverride = <local>
Trusted Zone: amazon.com\www
Trusted Zone: backpaintest.org\www
Trusted Zone: clonewarsadventures.com
Trusted Zone: freerealms.com
Trusted Zone: internetgrill.com\www
Trusted Zone: medicare.gov\www
Trusted Zone: medscape.com\login
Trusted Zone: mywebgrocer.com\shoprite
Trusted Zone: soe.com
Trusted Zone: sony.com
TCP: DhcpNameServer = 192.168.1.1 68.237.161.12
DPF: {E705A591-DA3C-4228-B0D5-A356DBA42FBF} - hxxp://ccfiles.creative.com/Web/softwareupdate/su2/ocx/20015/CTSUEng.cab
.
- - - - ORPHANS REMOVED - - - -
.
Toolbar-Locked - (no file)
AddRemove-Adobe Flash Player ActiveX - c:\windows\SysWOW64\Macromed\Flash\FlashUtil32_14_0_0_145_ActiveX.exe
.
.
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_14_0_0_145_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_14_0_0_145_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_14_0_0_145_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_14_0_0_145_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Shockwave Flash Object"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_14_0_0_145.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus]
@="0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID]
@="ShockwaveFlash.ShockwaveFlash.14"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_14_0_0_145.ocx, 1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="ShockwaveFlash.ShockwaveFlash"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Macromedia Flash Factory Object"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_14_0_0_145.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ProgID]
@="FlashFactory.FlashFactory.1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_14_0_0_145.ocx, 1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="FlashFactory.FlashFactory"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}]
@Denied: (A 2) (Everyone)
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}\1.0]
@="Shockwave Flash"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\TypeLib\{FAB3E735-69C7-453B-A446-B6823C6DF1C9}]
@Denied: (A 2) (Everyone)
@=""
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\TypeLib\{FAB3E735-69C7-453B-A446-B6823C6DF1C9}\1.0]
@="FlashBroker"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes]
"SymbolicLinkValue"=hex(6):5c,00,52,00,45,00,47,00,49,00,53,00,54,00,52,00,59,
   00,5c,00,4d,00,41,00,43,00,48,00,49,00,4e,00,45,00,5c,00,53,00,4f,00,46,00,\
.
Completion time: 2014-08-16  12:23:19
ComboFix-quarantined-files.txt  2014-08-16 16:23
ComboFix2.txt  2014-08-14 15:46
.
Pre-Run: 533,032,677,376 bytes free
Post-Run: 532,998,643,712 bytes free
.
- - End Of File - - 6F7B96FC9DD66A140B3D14EC3E568EF7
5C616939100B85E558DA92B899A0FC36
 

 

ESET

 

 

C:\FRST\Quarantine\C\Windows\System32\rpcss.dll.xBAD Win64/Patched.I trojan cleaned - quarantined
 

Link to post
Share on other sites

The only entry ESET found was already quarantined by FRST from a previous infection, so your system was basically clean. Yes you can delete that file and UNinstall ESET scanner..

 

if no remaining issues or concerns do the following:

 

Download and run this:

 

http://download.bleepingcomputer.com/sUBs/CF_UNINST.EXE'> http://download.bleepingcomputer.com/sUBs/CF_UNINST.EXE

 

That will remove Combofix and associated folders...

 

Next,

 

Download "Delfix by Xplode" and save it to your desktop.

 

"Delfix link mirror"

 

Double Click to start the program. If you are using Vista or higher, please right-click and choose run as administrator

 

Make Sure the following items are checked:

 


    Activate UAC
    Remove disinfection tools
    Create registry backup
    Purge System Restore
    Reset system settings

 

Now click on "Run" and wait patiently until the tool has completed.

 

The tool will create a log when it has completed. We don't need you to post this.

 

Part of the routine will be to create a registry back up with ERUNT,  the back up will be created here:

 

C:\Windows\ERUNT

 

When all is known to be well with your system you can delete that back up folder if you consider it as not needed...

 

next,

 

Read the following link to fully understand PC security and best practices, you may find it useful....

 

http://www.bleepingcomputer.com/forums/t/407147/answers-to-common-security-questions-best-practices/#entry2316629

 

Let me know if we can close out your thread.

 

Take care and surf safe,

 

Kevin.... ;)

Link to post
Share on other sites

Thank you, but my problems seem to have gotten worse, not better, since I posted those logs-- plus all the things from my original post are still true.

Noticed a file called security.exe on my desktop that was not there before-- or had to have gotten therevery recently. It has no identifying ppropertesi

Something is running and using cpu and memory even when I am just sitting there staring at task manager, not touching anything. Memory use goes up/stays up at 85 percent y if I do try to use it and eventually things crawl/stall. Mouse still feels laggy and inacurate as if something remote is going on. Even the little user icon in the start area is changed to a different icons. I checked remote access option in Windows. It is not enabled.

I trired to see if Mbytes/mse would run. m s e started with a a file namwe I never remember seeing before... then started repeating a bunch with the English word download followed by asian letters.

I canceled scan.

Not sure what to do., I tried to boot to safe mode and it failed twice? But now I am in in safe mode without network and and I don't reecognize some of the task manager entries. I just left it like that to write from a wireless.

Any advice appreciated. I have never had something like this.

Link to post
Share on other sites

Thanks for the update, did you run any of the tools to remove Combofix and clean up the other apps we used?

 

Next,

 

Please download RogueKiller and save it to your desktop from the following link: http://www.bleepingcomputer.com/download/roguekiller/

 

  • Quit all running programs.
  • For Windows XP, double-click to start.
  • For Vista,Windows 7/8, Right-click on the program and select Run as Administrator to start and when prompted allow it to run.
  • Read and accept the EULA (End User Licene Agreement)
  • Click Scan to scan the system.
  • When the scan completes select "Report" save to desktop. Close the program > Don't Fix anything!
  • Post back the report which should be located on your desktop.

 

Kevin...

Link to post
Share on other sites

The only entry ESET found was already quarantined by FRST from a previous infection, so your system was basically clean. Yes you can delete that file and UNinstall ESET scanner..

 

if no remaining issues or concerns do the following:

 

Download and run this:

 

http://download.bleepingcomputer.com/sUBs/CF_UNINST.EXE

 

That will remove Combofix and associated folders...

 

Next,

 

Download "Delfix by Xplode" and save it to your desktop.

 

"Delfix link mirror"

 

Double Click to start the program. If you are using Vista or higher, please right-click and choose run as administrator

 

Make Sure the following items are checked:

 

 

  •  

       

  • Activate UAC

     

       

  • Remove disinfection tools

     

       

  • Create registry backup

     

       

  • Purge System Restore

     

       

  • Reset system settings

     

     

 

 

Now click on "Run" and wait patiently until the tool has completed.

 

The tool will create a log when it has completed. We don't need you to post this.

 

Part of the routine will be to create a registry back up with ERUNT,  the back up will be created here:

 

C:\Windows\ERUNT

 

When all is known to be well with your system you can delete that back up folder if you consider it as not needed...

 

next,

 

Read the following link to fully understand PC security and best practices, you may find it useful....

 

http://www.bleepingcomputer.com/forums/t/407147/answers-to-common-security-questions-best-practices/#entry2316629

 

Let me know if we can close out your thread.

 

Take care and surf safe,

 

Kevin.... ;)

 

This step was not started because it was prefaced with, "if no remaining issues."  

 

Instead, I posted about the remaining issues.

 

So as not to do this wrong and cause problems, should I do the above steps BEFORE the Rogue killer?   

 

Thanks for your patience!

Link to post
Share on other sites

RogueKiller V9.2.8.0 [Jul 11 2014] by Adlice Software





 

Operating System : Windows Vista (6.0.6002 Service Pack 2) 64 bits version

Started in : Normal mode

User : Allison [Admin rights]

Mode : Scan -- Date : 08/18/2014  13:08:31

 

¤¤¤ Bad processes : 0 ¤¤¤

 

¤¤¤ Registry Entries : 30 ¤¤¤

[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters | DhcpNameServer : 192.168.1.1 68.237.161.12  -> FOUND

[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters | DhcpNameServer : 192.168.1.1 68.237.161.12  -> FOUND

[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet003\Services\Tcpip\Parameters | DhcpNameServer : 192.168.1.1 68.237.161.12  -> FOUND

[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{EEB9E754-1132-4534-A57D-300C666D5229} | DhcpNameServer : 192.168.1.1 68.237.161.12  -> FOUND

[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{EEB9E754-1132-4534-A57D-300C666D5229} | DhcpNameServer : 192.168.1.1 68.237.161.12  -> FOUND

[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet003\Services\Tcpip\Parameters\Interfaces\{EEB9E754-1132-4534-A57D-300C666D5229} | DhcpNameServer : 192.168.1.1 68.237.161.12  -> FOUND

[PUM.Policies] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System | DisableRegistryTools : 0  -> FOUND

[PUM.Policies] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System | DisableRegistryTools : 0  -> FOUND

[PUM.StartMenu] (X64) HKEY_USERS\S-1-5-21-463038520-2122480991-1874822206-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowRecentDocs : 0  -> FOUND

[PUM.StartMenu] (X64) HKEY_USERS\S-1-5-21-463038520-2122480991-1874822206-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_TrackProgs : 0  -> FOUND

[PUM.StartMenu] (X64) HKEY_USERS\S-1-5-21-463038520-2122480991-1874822206-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowSetProgramAccessAndDefaults : 0  -> FOUND

[PUM.StartMenu] (X64) HKEY_USERS\S-1-5-21-463038520-2122480991-1874822206-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowPrinters : 0  -> FOUND

[PUM.StartMenu] (X86) HKEY_USERS\S-1-5-21-463038520-2122480991-1874822206-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowRecentDocs : 0  -> FOUND

[PUM.StartMenu] (X86) HKEY_USERS\S-1-5-21-463038520-2122480991-1874822206-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_TrackProgs : 0  -> FOUND

[PUM.StartMenu] (X86) HKEY_USERS\S-1-5-21-463038520-2122480991-1874822206-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowSetProgramAccessAndDefaults : 0  -> FOUND

[PUM.StartMenu] (X86) HKEY_USERS\S-1-5-21-463038520-2122480991-1874822206-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowPrinters : 0  -> FOUND

[PUM.DesktopIcons] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1  -> FOUND

[PUM.DesktopIcons] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {59031a47-3f72-44a7-89c5-5595fe6b30ee} : 1  -> FOUND

[PUM.DesktopIcons] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1  -> FOUND

[PUM.DesktopIcons] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {59031a47-3f72-44a7-89c5-5595fe6b30ee} : 1  -> FOUND

[PUM.HomePage] (X64) HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main | Start Page : http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=msnhome  -> FOUND

[PUM.HomePage] (X86) HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main | Start Page : http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=msnhome  -> FOUND

[PUM.HomePage] (X64) HKEY_USERS\S-1-5-18\Software\Microsoft\Internet Explorer\Main | Start Page : http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=msnhome  -> FOUND

[PUM.HomePage] (X86) HKEY_USERS\S-1-5-18\Software\Microsoft\Internet Explorer\Main | Start Page : http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=msnhome  -> FOUND

[PUM.SearchPage] (X64) HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main | Search Page : http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch  -> FOUND

[PUM.SearchPage] (X86) HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main | Search Page : http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch  -> FOUND

[PUM.SearchPage] (X64) HKEY_USERS\S-1-5-21-463038520-2122480991-1874822206-1000\Software\Microsoft\Internet Explorer\Main | Search Page : http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch  -> FOUND

[PUM.SearchPage] (X86) HKEY_USERS\S-1-5-21-463038520-2122480991-1874822206-1000\Software\Microsoft\Internet Explorer\Main | Search Page : http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch  -> FOUND

[PUM.SearchPage] (X64) HKEY_USERS\S-1-5-18\Software\Microsoft\Internet Explorer\Main | Search Page : http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch  -> FOUND

[PUM.SearchPage] (X86) HKEY_USERS\S-1-5-18\Software\Microsoft\Internet Explorer\Main | Search Page : http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch  -> FOUND

 

¤¤¤ Scheduled tasks : 0 ¤¤¤

 

¤¤¤ Files : 0 ¤¤¤

 

¤¤¤ HOSTS File : 1 ¤¤¤

[C:\Windows\System32\drivers\etc\hosts] 127.0.0.1       localhost

 

¤¤¤ Antirootkit : 0 (Driver: NOT LOADED [0xc000036b]) ¤¤¤

 

¤¤¤ Web browsers : 0 ¤¤¤

 

¤¤¤ MBR Check : ¤¤¤

+++++ PhysicalDrive0:  +++++

--- User ---

[MBR] c38aa11d0b607d1d1c404006cb83645c

[bSP] 73c08f13d5a283f21d59ae9eb5eb7e5a : HP MBR Code

Partition table:

0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 953867 MB

User = LL1 ... OK

Error reading LL2 MBR! ([1] Incorrect function. )
Link to post
Share on other sites

That log is ok, no obvious malware/infection, continue as follows.....

 

Please download Malwarebytes Anti-Rootkit from here:  http://downloads.malwarebytes.org/file/mbar

 

[list]
[*]Unzip the contents to a folder in a convenient location.
[*]Open the folder where the contents were unzipped and run mbar.exe [*]Follow the instructions in the wizard to update and allow the program to scan your computer for threats. [*]Click on the Cleanup button to remove any threats and reboot if prompted to do so. [*]Wait while the system shuts down and the cleanup process is performed. [*]Perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If they do, then click Cleanup once more and repeat the process. [*]When done, please post the two logs produced they will be in the MBAR folder... mbar-log.txt and system-log.txt

 

Kevin

Link to post
Share on other sites

Long story short:  Between my last post and this I had to do a system restore to have use of my computer.

 

Memory and CPU use still 30-50% while idle

 

Highest/constant memory use:

svchost.exe (LocalSystemNetworkRestricted)

I don't know how to isolate which serivice is causing it.  Show services shows:

-wudfsvc

-UxSms

-SysMain

-PcaSvc

-Netman

-hidserv

-EMDMgmt

-AudioEndpointBuilder

 

Searched wudfsvc to see what folder it was in.  Attached a screenshot.

 

Couldn't look for others because search no longer working and can no longer show system/hidden files.

 

Malwarebytes full scan is clean

MSE full scan is clean

ESET scan is clean

 

Didn't re-run anything else becasue I'm not sure how the system restore would effect results or if I should remove all the programs/reports and start over.

Link to post
Share on other sites

System restore will have taken us back to whatever date you used, i`m not really sure where we`re at now. The service you mention (wudfsvc) will run from the Systemm32 folder if legitimate...

I guess the best way is just to start over and see what the logs show....

Delete any versions of Combofix that you may have on your Desktop, download a fresh copy from either of the following links :-

http://download.bleepingcomputer.com/sUBs/ComboFix.exe

http://www.infospyware.net/antimalware/combofix/

  • Ensure that Combofix is saved directly to the Desktop <--- Very important
  • Disable all security programs as they will have a negative effect on Combofix, instructions available here  http://www.bleepingcomputer.com/forums/topic114351.html if required. Be aware the list may not have all programs listed, if you need more help please ask.
  • Close any open browsers and any other programs you might have running
  • Double click the combofix.gif icon to run the tool (Vista or Windows 7 users right click and select "Run as Administrator)
  • Instructions for running Combofix available here http://www.bleepingcomputer.com/combofix/how-to-use-combofix if required.
  • If you are using windows XP It might display a pop up saying that "Recovery console is not installed, do you want to install?" Please select yes & let it download the files it needs to do this. Once the recovery console is installed Combofix will then offer to scan for malware. Select continue or yes.
  • When finished, it will produce a report for you. Please post the "C:\ComboFix.txt" for further review



****Note: Do not mouseclick combofix's window while it's running. That may cause it to stall or freeze ****

Note: ComboFix may reset a number of Internet Explorer's settings, including making it the default browser.
Note: Combofix prevents autorun of ALL CDs, floppies and USB devices to assist with malware removal & increase security. If this is an issue or makes it difficult for you -- please tell us when you reply. Read here  http://thespykiller.co.uk/index.php?page=20 why  disabling autoruns is recommended.

*EXTRA NOTES*


  •    
  • If Combofix detects any Rootkit/Bootkit activity on your system it will give a warning and prompt for a reboot, you must allow it to do so.
       
  • If Combofix reboot's due to a rootkit, the screen may stay black for several minutes on reboot, this is normal
       
  • If after running Combofix you receive any type of warning message about registry key's being listed for deletion when trying to open certain items, reboot the system and this will fix the issue (Those items will not be deleted)



Post the log in next reply please...

Kevin

Link to post
Share on other sites

ComboFix 14-08-19.01 - Allison 08/20/2014  18:58:51.2.4 - x64
Microsoft® Windows Vista™ Home Premium   6.0.6002.2.1252.1.1033.18.8190.6261 [GMT -4:00]
Running from: c:\users\Allison\Desktop\ComboFix.exe
AV: Microsoft Security Essentials *Disabled/Updated* {641105E6-77ED-3F35-A304-765193BCB75F}
SP: Microsoft Security Essentials *Disabled/Updated* {DF70E402-51D7-30BB-99B4-4D23E83BFDE2}
SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
(((((((((((((((((((((((((   Files Created from 2014-07-20 to 2014-08-20  )))))))))))))))))))))))))))))))
.
.
2014-08-20 23:04 . 2014-08-20 23:04 -------- d-----w- c:\users\Default\AppData\Local\temp
2014-08-20 10:18 . 2014-08-19 21:14 1169712 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{DA38A8DF-84E6-4252-ACDA-32D17238FC00}\gapaengine.dll
2014-08-20 10:15 . 2014-08-07 08:59 11319200 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{0E62F4D6-23C1-4266-BA05-2C03015B055C}\mpengine.dll
2014-08-20 05:14 . 2014-08-07 08:59 11319200 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll
2014-08-20 03:18 . 2014-08-20 03:18 -------- d-----w- c:\program files (x86)\Microsoft Silverlight
2014-08-19 22:27 . 2014-06-26 22:17 8848 ----a-w- c:\windows\system32\icardres.dll
2014-08-19 22:27 . 2014-06-26 22:17 171152 ----a-w- c:\windows\system32\infocardapi.dll
2014-08-19 22:27 . 2014-06-26 22:17 1389200 ----a-w- c:\windows\system32\icardagt.exe
2014-08-19 22:27 . 2014-06-26 22:17 99480 ----a-w- c:\windows\SysWow64\infocardapi.dll
2014-08-19 22:27 . 2014-06-26 22:17 8856 ----a-w- c:\windows\SysWow64\icardres.dll
2014-08-19 22:27 . 2014-06-26 22:17 619664 ----a-w- c:\windows\SysWow64\icardagt.exe
2014-08-19 22:27 . 2014-06-06 04:29 35480 ----a-w- c:\windows\system32\TsWpfWrp.exe
2014-08-19 22:27 . 2014-06-06 04:28 35480 ----a-w- c:\windows\SysWow64\TsWpfWrp.exe
2014-08-19 22:25 . 2014-07-08 01:12 2048 ----a-w- c:\windows\system32\tzres.dll
2014-08-19 22:25 . 2014-07-08 00:46 2048 ----a-w- c:\windows\SysWow64\tzres.dll
2014-08-19 22:25 . 2014-06-02 21:30 3137536 ----a-w- c:\windows\system32\msi.dll
2014-08-19 22:25 . 2014-06-02 21:29 2280448 ----a-w- c:\windows\system32\authui.dll
2014-08-19 22:25 . 2014-06-02 10:31 2263552 ----a-w- c:\windows\SysWow64\msi.dll
2014-08-19 22:25 . 2014-06-02 20:29 87552 ----a-w- c:\windows\system32\consent.exe
2014-08-19 22:25 . 2014-06-02 10:30 1993728 ----a-w- c:\windows\SysWow64\authui.dll
2014-08-19 22:25 . 2014-06-02 21:30 503296 ----a-w- c:\windows\system32\msihnd.dll
2014-08-19 22:25 . 2014-06-02 21:29 45056 ----a-w- c:\windows\system32\appinfo.dll
2014-08-19 22:25 . 2014-06-02 10:31 332800 ----a-w- c:\windows\SysWow64\msihnd.dll
2014-08-19 17:34 . 2014-08-19 17:34 -------- d-----w- c:\users\Allison\AppData\Local\Adobe
2014-08-18 22:39 . 2014-08-18 22:48 -------- d-----w- c:\programdata\Malwarebytes' Anti-Malware (portable)
2014-08-18 19:45 . 2014-08-18 19:45 -------- d-----w- c:\users\Allison\AppData\Local\CrashDumps
2014-08-18 17:03 . 2014-08-18 17:03 -------- d-----w- c:\programdata\RogueKiller
2014-08-08 19:41 . 2014-08-08 19:41 -------- d-----w- c:\program files (x86)\Common Files\Adobe(13)
2014-08-06 16:39 . 2014-08-20 15:56 122584 ----a-w- c:\windows\system32\drivers\MBAMSwissArmy.sys
2014-08-06 16:39 . 2014-08-06 16:39 -------- d-----w- c:\program files (x86)\Malwarebytes Anti-Malware
2014-08-06 16:39 . 2014-05-12 11:26 64216 ----a-w- c:\windows\system32\drivers\mwac.sys
2014-08-06 16:39 . 2014-05-12 11:26 91352 ----a-w- c:\windows\system32\drivers\mbamchameleon.sys
2014-08-06 16:39 . 2014-05-12 11:25 25816 ----a-w- c:\windows\system32\drivers\mbam.sys
2014-08-05 16:36 . 2014-06-02 21:29 1435136 ----a-w- c:\program files\Common Files\Microsoft Shared\ink\journal.dll
2014-08-05 16:36 . 2014-06-02 10:30 937472 ----a-w- c:\program files (x86)\Common Files\Microsoft Shared\ink\journal.dll
2014-08-05 16:35 . 2014-06-07 00:33 2777088 ----a-w- c:\windows\system32\win32k.sys
2014-08-05 16:35 . 2014-06-06 08:59 506880 ----a-w- c:\windows\SysWow64\qedit.dll
2014-08-05 16:35 . 2014-06-06 07:13 620032 ----a-w- c:\windows\system32\qedit.dll
2014-08-05 16:35 . 2014-05-30 07:10 404992 ----a-w- c:\windows\system32\drivers\afd.sys
2014-07-30 21:59 . 2014-07-30 21:59 -------- d-----w- C:\ArcheAge
2014-07-30 17:10 . 2014-08-19 21:00 -------- d-----w- c:\users\Allison\AppData\Local\Glyph
2014-07-30 16:15 . 2014-07-30 16:15 -------- d-----w- c:\programdata\Glyph
2014-07-30 16:15 . 2014-08-19 21:00 -------- d-----w- c:\program files (x86)\Glyph
2014-07-24 23:43 . 2013-12-19 21:17 4019992 -c--a-w- c:\programdata\Microsoft\Windows\WER\ReportQueue\Report21dcf088\GTLite.exe
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2014-08-19 22:35 . 2006-11-02 12:35 99218768 ----a-w- c:\windows\system32\mrt.exe
2014-08-19 21:14 . 2012-06-17 19:23 1169712 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\NISBackup\gapaengine.dll
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
"EnableSecureUIAPath"= 1 (0x1)
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WudfSvc]
@="Service"
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - WS2IFSL
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\svchost]
hpdevmgmt REG_MULTI_SZ    hpqcxs08 hpqddsvc
.
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Svchost  - NetSvcs
Themes
.
.
--------- X64 Entries -----------
.
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MSC"="c:\program files\Microsoft Security Client\msseces.exe" [2014-03-11 1271072]
.
------- Supplementary Scan -------
.
uLocal Page = c:\windows\system32\blank.htm
uStart Page = https://www.google.com/
mLocal Page = c:\windows\system32\blank.htm
uInternet Settings,ProxyOverride = <local>
Trusted Zone: amazon.com\www
Trusted Zone: backpaintest.org\www
Trusted Zone: clonewarsadventures.com
Trusted Zone: freerealms.com
Trusted Zone: internetgrill.com\www
Trusted Zone: medicare.gov\www
Trusted Zone: medscape.com\login
Trusted Zone: mywebgrocer.com\shoprite
Trusted Zone: soe.com
Trusted Zone: sony.com
TCP: DhcpNameServer = 192.168.1.1 68.237.161.12
DPF: {E705A591-DA3C-4228-B0D5-A356DBA42FBF} - hxxp://ccfiles.creative.com/Web/softwareupdate/su2/ocx/20015/CTSUEng.cab
.
- - - - ORPHANS REMOVED - - - -
.
Toolbar-Locked - (no file)
.
.
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes]
"SymbolicLinkValue"=hex(6):5c,00,52,00,45,00,47,00,49,00,53,00,54,00,52,00,59,
   00,5c,00,4d,00,41,00,43,00,48,00,49,00,4e,00,45,00,5c,00,53,00,4f,00,46,00,\
.
Completion time: 2014-08-20  19:05:54
ComboFix-quarantined-files.txt  2014-08-20 23:05
ComboFix2.txt  2014-08-20 22:53
ComboFix3.txt  2014-08-16 16:23
ComboFix4.txt  2014-08-14 15:46
.
Pre-Run: 531,784,454,144 bytes free
Post-Run: 531,700,936,704 bytes free
.
- - End Of File - - 97797126F0F528706C1FBE191E6C1CDB
5C616939100B85E558DA92B899A0FC36
 

Link to post
Share on other sites

Another clean log, run the following:

 

Download TDSSKiller and save it to your Desktop.

 

Make sure TDSSKiller.exe  is on the Desktop itself, not within a folder on the desktop.

 

Go to Start > Run (Or you can hold down your Windows key and press R) and copy and paste the following into the text field. (make sure you include the quote marks) Then press OK.

 

"%userprofile%\Desktop\TDSSKiller.exe" -l C:\TDSSKiller.txt

 

If it says "Hidden service detected" DO NOT type anything in. Just press Enter on your keyboard to not do anything to the file.

If Malicious objects are found, do NOT select Delete or Cure. Change the action to Skip, When it is done, a log file should be created on your C: drive called "TDSSKiller.txt" please copy and paste the contents of that file here.

Link to post
Share on other sites

To attach the file open "More Reply Options" under the reply box next to "Post" that will open Attach File options. Use "Browse" to find the file, when found use the "Attach This File" option to do just that....

 

If the TDSSKiller log is clean there is no point uploading....

 

What is the currrent status of your system, can you list any any remaining issues or concerns....

 

Thanks,

 

Kevin...

Link to post
Share on other sites

All the concerns are the same as my original post-- except for that malwarbytes and MSE will run a full scan now. 

 

I did attach the file correctly, it just kept telling me no file attached, regardless. 

 

I'm starting to get random access denied messages now, so it's probably on my end.

 

I appreciate your time.  Maybe it's just an OS problem.  I guess just tell me how to get rid of all the tools I downloaded.

 

Thank you.

Link to post
Share on other sites

Run the following before we clean up or close out, although the last few logs were clean there may still be local issues....

 

Download AdwCleaner by Xplode onto your Desktop.

  • Double click on Adwcleaner.exe to run the tool.
  • Click on Scan
  • Once the scan is done, click on the Clean button.
  • You will get a prompt asking to close all programs. Click OK.
  • Click OK again to reboot your computer.
  • A text file will open after the restart. Please post the content of that logfile in your reply.
  • You can also find the logfile at C:\AdwCleaner[sn].txt. Where n is the scan reference number

 
Next,
 
thisisujrt.gif Please download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.

 

Next,

 

Depending what version of Malwarebytes you have run the following:

 

Malwarebytes ver: 1.75 "Quick scan"

Run Malwarebytes,  Open: Settings Tab > Scanner Settings > Under action for PUP > Select: Show in Results List and Check for removal.

Please Update and run a Quick scan

Make sure that everything is checked, and click Remove Selected on any found items.

Post the produced log


Open Malwarebytes 2.0, run a Threat Scan

  • On the Dashboard, click the 'Update Now >>' link
  • After the update completes, click the 'Scan Now >>' button.
  • Or, on the Dashboard, click the Scan Now >> button.
  • If an update is available, click the Update Now button.
  • A Threat Scan will begin.
  • When the scan is complete, if there have been detections, click Apply Actions to allow MBAM to clean what was detected.
  • In most cases, a restart will be required.
  • Wait for the prompt to restart the computer to appear, then click on Yes.


Post log:

  • After the restart once you are back at your desktop, open MBAM once more.
  • Click on the History tab > Application Logs.
  • Double click on the scan log which shows the Date and time of the scan just performed.
  • Click 'Copy to Clipboard'
  • Paste the contents of the clipboard into your reply.

 

Next,

 

Download Farbar Service Scanner from here: http://www.bleepingcomputer.com/download/farbar-service-scanner/dl/62/ and run it on the computer with the issue.
Make sure the following options are checked:

  • Internet Services
  • Windows Firewall
  • System Restore
  • Security Center/Action Center
  • Windows Update
  • Windows Defender


  • Press "Scan".
  • It will create a log (FSS.txt) in the same directory the tool is run.
  • Please copy and paste the log to your reply.


 

Thanks,

 

Kevin

 

 

 

Link to post
Share on other sites

Had spiking memory and cpu again.  Resource monitor always shows svchost.exe LocalServiceNetworkRestricted as the memory source when this happens. 

Disk was showing large read on a .dat from a game I was not playing and had not played since several days and reboots ago.  I shut off MSE real time to see if it was scanning outside of schedule and it wasn't that. 

 

Right now Disk is showing a read on a different game, background priority

 

 

# AdwCleaner v3.308 - Report created 22/08/2014 at 16:09:15
# Updated 20/08/2014 by Xplode
# Operating System : Windows Vista Home Premium Service Pack 2 (64 bits)
# Username : Allison - ALLISON-PC
# Running from : C:\Users\Allison\Desktop\AdwCleaner.exe
# Option : Clean

***** [ Services ] *****

***** [ Files / Folders ] *****

***** [ Scheduled Tasks ] *****

***** [ Shortcuts ] *****

***** [ Registry ] *****

Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Extension Compatibility\{74F475FA-6C75-43BD-AAB9-ECDA6184F600}

***** [ Browsers ] *****

-\\ Internet Explorer v9.0.8112.16563

-\\ Google Chrome v36.0.1985.143

[ File : C:\Users\Allison\AppData\Local\Google\Chrome\User Data\Default\preferences ]

*************************

AdwCleaner[R0].txt - [3156 octets] - [12/05/2014 08:37:24]
AdwCleaner[R1].txt - [940 octets] - [06/08/2014 10:46:30]
AdwCleaner[R2].txt - [983 octets] - [06/08/2014 13:04:31]
AdwCleaner[R3].txt - [1545 octets] - [19/08/2014 17:31:09]
AdwCleaner[R4].txt - [1412 octets] - [22/08/2014 16:07:28]
AdwCleaner[s0].txt - [2976 octets] - [12/05/2014 08:42:02]
AdwCleaner[s1].txt - [1000 octets] - [06/08/2014 11:00:52]
AdwCleaner[s2].txt - [1043 octets] - [06/08/2014 13:05:23]
AdwCleaner[s3].txt - [1614 octets] - [19/08/2014 17:32:55]
AdwCleaner[s4].txt - [1335 octets] - [22/08/2014 16:09:15]

########## EOF - C:\AdwCleaner\AdwCleaner[s4].txt - [1395 octets] ##########

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.